Security
TABLE OF CONTENTS
loading...
POINTCARE PLATFORM SECURITY
At PointCare, we take the security of our customers' data seriously. We have implemented a range of measures to protect our customers' information, including advanced security capabilities, robust security protocols, and multi-factor authentication (MFA).
Robust Security Protocols
We implement strict security protocols to prevent data breaches and cyber attacks. These protocols include:
- Encryption of sensitive data at rest and in transit: We use industry-standard encryption algorithms to protect data both at rest and in transit. Data at rest is encrypted using AES-256 encryption, which is one of the strongest encryption algorithms available. Data in transit is encrypted using SSL/TLS protocols, which ensure that data is securely transmitted over the internet.
- Regular security assessments: We conduct regular security assessments to identify potential vulnerabilities and remediate them before they can be exploited. We use a combination of automated and manual security testing techniques to identify vulnerabilities in our systems, and we work closely with third-party security experts to ensure that our systems are secure.
- Strict access controls: We implement strict access controls to ensure that only authorized personnel can access customer data. We use role-based access control (RBAC) to control access to our systems and data. RBAC allows us to define roles and permissions for each user, ensuring that they only have access to the data and systems that they need to perform their job.
- Continuous monitoring and logging: We continuously monitor and log system activity to identify any suspicious behavior. We use a combination of automated and manual monitoring techniques to detect anomalous behavior.
Advanced Security Capabilities
We use advanced security capabilities to enhance the security of our product. These capabilities include:
- Advanced encryption capabilities: In addition to the encryption of sensitive data at rest and in transit, we have advanced encryption capabilities that allow us to encrypt data in real-time. This ensures that data is protected from unauthorized access even while it is being used.
- Real-time monitoring and alerting: We use real-time monitoring and alerting to identify any suspicious behavior. We use a combination of automated and manual monitoring techniques to detect anomalous behavior. In the event of a security incident, we have incident response procedures in place to ensure that the incident is contained and remediated quickly.
- Tracking of changes to data over time: We track changes to data over time to maintain compliance with regulatory requirements. This allows us to maintain an audit trail of all changes to data, ensuring that we can demonstrate compliance with regulatory requirements.
Multi-Factor Authentication (MFA) Options
We offer MFA options to add an extra layer of security to our customers' accounts. Our MFA options include:
- Salesforce Authenticator Mobile App: This solution uses push notifications for a frictionless experience.
- Third-Party Authenticator Apps: This solution uses temporary codes based on the OATH time-based one-time password (TOTP) algorithm. Supported apps include Google Authenticator, Microsoft Authenticator, and Authy.
- Security Keys: This solutions uses small physical devices with no installation and no codes to enter, such as USB, Lightning, and NFC keys that support the WebAuthn or U2F standards, including Yubico’s YubiKey and Google’s Titan Security Key.
Conclusion
At PointCare, we are committed to protecting our patients' data and keeping it secure from cyber threats. By using advanced security capabilities, implementing robust security protocols, and offering MFA options, we are able to provide a high level of security for our customers. If you have any questions or concerns about the security of our product, please don't hesitate to contact us.